Image encryption with General Singular Values Decomposition via logistic function by encryption key only real number (method-2)
-
Published:2023
Issue:6
Volume:26
Page:1311-1318
-
ISSN:0972-0502
-
Container-title:Journal of Interdisciplinary Mathematics
-
language:
-
Short-container-title:JIM
Author:
Abdul-Hameed MohammedORCID
Abstract
In this algorithm the development of a previous algorithm was a master’s thesis by researcher Maher AL-Bashkani. Where he used a technique (gsvd) with Logistic function to encrypt the image through a composite key which is two keys. The first is a real number and the second is a picture. In this algorithm we will call it (MK-11) we will dispense with the second key (picture) and with only the first key (real number). We will generate a 3D matrix that represents another key we create through the work of our algorithm. This is a new method that has not been used by previous algorithms. We know nothing about this triple matrix we create by implementing the algorithm. Therefore, this algorithm is considered very excellent and possesses high immunity against hackers who try to break the encryption. The work of this algorithm focuses on three steps: The first is to create an array with the same dimensions as the image we want to encode depending on the numerical components of the image matrix as we will see later. The second step is the first distraction of the image matrix by adopting the first encryption key (real number) and logistic function. Step 3 We apply GSVD between the resulting image matrix after the first encoding contained in the second step above and the matrix that was created in the first step above to perform a second encryption step, the final encryption is two steps of encryption which adds complexity to the image encryption makes it difficult to penetrate by hackers. The results we obtained by implementing this algorithm were excellent and compete readings for modern algorithms. It is superior to accuracy and quality. Therefore, this algorithm can be adopted in information security.
Publisher
Taru Publications
Subject
Applied Mathematics,Analysis